Zeljka Zorz
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
Enterprise VPN apps store authentication and session cookies insecurely
CVE-2019-1573, a flaw that makes VPN applications store the authentication and/or session cookies insecurely (i.e. unencrypted) in memory and/or log files, affects a yet to be …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095839/email-400x200.jpg)
A quarter of phishing emails bypass Office 365 security
Email phishing is one of the most often used – and most successfully used – attack vectors that lead to cybersecurity incidents and breaches. Microsoft is the most …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102230/wifi-400x200.jpg)
WPA3 design flaws affect security of new Wi-Fi standard
Researchers have discovered a number of design flaws affecting the security of the recently introduced WPA3 data transmission protocol. Collectively dubbed Dragonblood …
![arrest](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105159/arrest-400x200.jpg)
WikiLeaks’ Julian Assange arrested in London
Wikileaks founder Julian Assange has been arrested by officers of the Metropolitan Police at the Embassy of Ecuador in London. “He has been taken into custody at a …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095746/industry-400x200.jpg)
TRITON attackers detected at another critical infrastructure facility
The attackers who were first spotted wielding the custom TRITON framework have targeted another critical infrastructure facility, FireEye researchers have revealed on …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103155/patch-400x200.jpg)
April 2019 Patch Tuesday: Microsoft fixes two actively exploited bugs
Microsoft has plugged 74 CVE-numbered security holes on this April 2019 Patch Tuesday, including two vulnerabilities actively exploited by attackers. All of the bugs are rated …
![Biohacking Village](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094638/biohacking_village-400x200.jpg)
Hacking healthcare: A call for infosec researchers to probe biomedical devices
It is a brave new connected world out there and there is no shortage of cybersecurity risks associated with everything we do. We can’t even be sure that the technologies …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100324/windows2-400x200.jpg)
Windows 10: New update controls for end users, automatic removal of broken updates
It seems that last year’s Windows 10 updating troubles have spurred Microsoft to make some changes to the operating system’s update experience and the …
![Apache](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103105/apache-400x200.jpg)
PoC exploit for Carpe Diem Apache bug released
Charles Fol, the security engineer that unearthed the Carpe Diem Apache HTTP Server bug (CVE-2019-0211), has released an exploit for it. “This is between a POC and a …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094642/building-400x200.jpg)
Is your organization getting physical security right?
For most organizations (and especially for tech companies), the physical security of data centers and headquarters is of the utmost importance. As Tim Roberts, a senior …
![FileTSAR](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094645/FileTSAR-400x200.jpg)
FileTSAR: Free digital forensic investigations toolkit for law enforcement
Purdue University cybersecurity experts have created FileTSAR, an all-in-one digital forensic investigations toolkit for law enforcement. About FileTSAR FileTSAR, which stands …
![Magento](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100304/magento-400x200.jpg)
Magento sites under attack through easily exploitable SQLi flaw
A recently patched SQL injection flaw affecting the popular open-source e-commerce platform Magento is being actively exploited by attackers, so if you haven’t …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history